Understanding Security Risks and Best Practices  

Education Type: 
Live On-Site
Duration: 
1.5 hours
Level: 
Introductory
Date: 
03-15-2024
Time: 
10:30AM - 12:00PM (ET)
Location: 

Pittsburgh, PA

FEMP IACET: 
0.2 CEU
Sponsored by: 

DOE Federal Energy Management Program - FEMP

Explore the intricacies of assessing and managing risks in complex industrial environments. Our experts will delve into the methodologies for identifying vulnerabilities, potential threats, and their impact on critical operations. Discover effective strategies for mitigating risks, including advanced cybersecurity measures and resilient system design. You will gain insights into industry best practices that enhance the security and reliability of industrial control systems (ICS). The session will cover the five dimensions of effective ICS security programs and associated tools, along with implementation recommendations. We will also outline industry-standard control frameworks (e.g., NIST 800-82, ISA 62443, DoD CMMC) to establish what might be most appropriate for your environment.

Instructors

David White, President, Axio  

David White is President and Co-founder at Axio - a company with an innovative methodology and software that provides companies with actionable visibility to their cyber risk. David leads Axio's federal, risk modeling, and professional services teams. He co-developed Axio's cyber risk management process and continues to refine its assessment, risk modeling, and insurance analysis components. He is an expert in cybersecurity frameworks and maturity models, cyber risk quantification, and cyber insurance. David is also faculty for Navigator, an executive education program for cyber leaders delivered by ISTARI and the University of Cambridge Judge Business School.

Tina Turner, Principal Cyber Risk, Senior Cybersecurity Analyst, Risk Mitigation Consulting  

Ms. Retina "Tina" Turner has over 20 years of military experience in cybersecurity and operational technology (OT) assessments and currently works at Risk Mitigation Consulting Global as a Principal, Cyber Risk and Senior Cybersecurity Analyst. Having retired from the US Marine Corps, she has 13 years of Department of Defense experience and clients identify her as a key contributor to the Navy and Marine Corps Mission Assurance Assessment teams. Throughout her career, clients entrust her to provide a comprehensive view of the security posture of facility-related control systems within their area of responsibility by exceeding DoD compliance and successfully achieving authorization to operate.

Cliff Glantz, Chief Scientist and Project Manager, Pacific Northwest National Laboratory, Department of Energy  

Cliff Glantz is a chief scientist and project manager with Pacific Northwest National Laboratory's Energy and Environment Directorate. His research focuses on critical infrastructure protection, cyber and cyber-physical security, risk management, consequence assessment modeling, and emergency response and preparedness. Glantz's recent work supports a broad array of national and international projects. He played an instrumental role in developing the U.S. Nuclear Regulatory Commission cybersecurity program in the wake of 9/11, including the development of their cybersecurity rule, regulatory guide, and assessment methodology. Glantz is the former Chair of the DOE Subcommittee on Technical Analysis and Response Support and coordinated its many working groups. He has played key roles in the development of several consequence assessment models that are widely used for emergency planning and response applications. Glantz has authored well over 200 publications and conference presentations and developed numerous products and tools since joining PNNL in 1982.

Learning Objectives

Upon completion of this course, attendees will be able to:

  • Recognize the methodology required to complete risk assessments;
  • Select the potential impacts that vulnerabilities and threats pose to critical infrastructure and operations;
  • Identify the multiple dimensions of effective ICS / FRCS security programs;
  • Identify industry-standard control system frameworks;
  • Recognize what risk is and why it is important to manage it.